Cryptographic Versus Trust-based Methods for MANET Routing Security

Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues into account. Subsequent proposals used strong cryptographic methods to secure the routing information. In the process, however, these protocols created new avenues for denial of service (DoS). Consequently, the trade-off between security strength and DoS vulnerability has emerged as an area requiring further investigation. It is believed that different trust methods can be used to develop protocols at various levels in this trade-off. To gain a handle on this exchange, real world testing that evaluates the cost of existing proposals is necessary. Without this, future protocol design is mere speculation. In this paper, we give the first comparison of SAODV and TAODV, two MANET routing protocols, which address routing security through cryptographic and trust-based means respectively. We provide performance comparisons on actual resource-limited hardware. Finally, we discuss design decisions for future routing protocols.

[1]  Todd Hughes,et al.  Dynamic Trust Applied to Ad Hoc Network Resources , 2003 .

[2]  OpenSSL OpenSSL : The open source toolkit for SSL/TSL , 2002 .

[3]  Shambhu Upadhyaya,et al.  Securing Information through Trust Management in Wireless Networks , 2004 .

[4]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[5]  S. Upadhyaya,et al.  Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .

[6]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[7]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[8]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[9]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[10]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[11]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[12]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[13]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[14]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[15]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[16]  Chung-wei Lee,et al.  Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.

[17]  H Deng,et al.  ROUTING SECURITY IN AD HOC NETWORKS , 2002 .

[18]  George N. Rouskas,et al.  Networking 2004 , 2004, Lecture Notes in Computer Science.

[19]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[20]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[21]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[22]  Yong Chen,et al.  Trust Propagation in Small Worlds , 2003, iTrust.

[23]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[24]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[25]  N. Pissinou,et al.  Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[26]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[27]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[28]  Alan Bundy,et al.  Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.

[29]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[30]  Markus Jakobsson,et al.  Stealth attacks on ad-hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[31]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[32]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[33]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[34]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[35]  Niki Pissinou,et al.  Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks , 2004, NETWORKING.

[36]  Partha Dasgupta,et al.  Trusting routers and relays in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[37]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[38]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[39]  Janne Lundberg Routing Security in Ad Hoc Networks , 2000 .